March 8, 2025

(Click here for a video version of the introduction)

Hello all,

Microsoft continued to have some sporadic issues this past week, but nowhere near as widespread as they had the prior weekend. Hopefully, by the time this makes it to you, they’ve fixed things. Speaking of fixing things, On Tuesday, Broadcom released emergency patches for 3 VMware zero-days that are under active exploitation. Elastic and Zoho both also released fixes. And if that wasn’t enough, This coming week is Patch Tuesday, are you ready?

Now on to details about these and other headline items.

Headline NEWS:

  • Undocumented commands found in Bluetooth chip used by a billion devices. The Chinese made ESP32 Bluetooth + WiFi chip contains undocumented commands that, “allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence.” So far, the manufacturer has not replied to requests to comment on why these commands exist.
  • Broadcom patches 3 VMware zero-days , with over 37,000 publicly facing servers still vulnerable as of Thursday of this past week. These nasty defects can enable a local administrator to escape a hosted machine down to the hypervisor to perform all sorts of havoc. There are no workarounds, patching is your only option. Don’t wait.
  • Elastic Releases Urgent Fix for Kibana Vulnerability Enabling Remote Code Execution, although this carries a Common Vulnerabilities and Exposures (CVE) score of 9.9 out of 10, exploitation is only possible under specific limited circumstances. Nevertheless, if you use Elastic Kibana for anything, you should verify immediately whether you need to take action, and if so, don’t wait. If you can’t apply the patch, there is temporary mitigation available.
  • Zoho ADSelfService Plus Vulnerability Let Attackers Gain Unauthorized Access, is a defect that allowed data exposure and “created a pathway for malicious actors to impersonate legitimate users, modify account recovery settings, and ultimately seize control of Active Directory accounts”. The fix is to update to version 6511 or higher.

In Ransomware, Malware, and Vulnerabilities News:

  • AI Deepfake is on the rise, this week’s full RedDotSecurity.news contains links to four different articles describing how executives and government leaders are being visually faked to steal credentials, promote cryptocurrency, and request fund transfers. One person that I work with was watching the SpaceX launch and had a fake Elon Musk interrupt and encourage him to purchase crypto just this week. The time to set up security controls to verify identity is now, not when the fake CEO is asking you for something.

In Other News Events of Note and Interest:

  • Microsoft tells abandoned Publisher fans to just use Word and hope for the best. I’ve personally used Microsoft’s Publisher for years, finding it to be an incredibly capable program for allowing excellent layout control. Sadly, Microsoft has announced that they’re killing it off in October next year, with no plans for a replacement, and nothing available that can import .PUB files with any fidelity. Sigh, I guess I’ll need to learn something new.

Musings:

The impending demise of Microsoft Publisher got me to thinking about some of the various technological things that I’ve personally seen pass away. Some of my list contains WordStar, MS-DOS, Floppy Disks, SCSI, Lotus 123, Digital Equipment Corporation, CGA monitors, Prodigy, AOL, dialup modems, and even green-bar paper. But I’m not pining for them. Yes, I remember, but I know that we must advance, adapt, and evolve. Newer, better, faster, more efficient is the continual focus of our modern age. However, I still think killing off Microsoft Publisher is a mistake!

Visc. Jan Broucinek

Keep the shields up!

Viscount Jan Broucinek
Red Dot Security News

Headline NEWS
Ransomware, Malware, and Vulnerabilities News
Other News Events of Note and Interest

 

Share this with: